# https://syzkaller.appspot.com/bug?id=e79e120169a28f5503d09f9920df7d68d9fd47ef # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true} r0 = paccept(0xffffffffffffff9c, 0x0, 0x0, 0x40000000) fcntl$lock(r0, 0x9, &(0x7f0000001080)={0x2, 0x0, 0x2, 0x8001}) r1 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000001100)) accept$inet6(r1, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) recvmsg(r2, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=""/190, 0xbe}, 0x43) socket$unix(0x1, 0x5, 0x0) pipe2(&(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0x66, &(0x7f00000024c0)={0x7, 0x0, 0x7f, 0xe0, 0x80000000}, 0xc) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x90, 0xffffffffffffffff, 0x0, 0x5) getsockname(0xffffffffffffffff, 0x0, &(0x7f00000026c0)) bind$unix(r1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r2)